Cyberspace and Cybersecurity

Lessons
Lab
AI Tutor (Add-on)
Get A Free Trial

About This Course

Skills You’ll Get

1

Preface

  • The Modern World
  • Purpose and Audience
  • The Course
2

Vulnerabilities in Information Systems

  • Introduction
  • Causes of Vulnerability
  • Measuring Vulnerability
  • Avoiding Vulnerabilities through Secure Coding
  • Mistakes Can Be Good
  • Threats Classification
  • Threat Modeling Process
  • Security Starts at Home
  • Security in Applications
  • Introducing Countermeasures
  • International Awareness
  • Exercises
3

Vulnerabilities in the Organization

  • Introduction
  • Common Organizational Vulnerabilities
  • Access Authorization and Authentication
  • Human Factors
  • Security Services
  • External Technologies
  • Vulnerabilities in Networks
  • Wireless Networks
  • Bluetooth
  • Wireless Fidelity
  • Worldwide Interoperability Microwave Access
  • Cloud Computing
  • Internet of Things
  • Automotive Cybersecurity
  • Vulnerability Assessment Tools
  • Exercises
4

Risks in Information Systems Infrastructure

  • Introduction
  • Risks in Hardware
  • Risks in Software
  • Risks in People
  • Risks in Laptops
  • Risks in Cyberspace
  • Risks in Legacy Infrastructure
  • Risks in Mobile Telephony
  • Risk Insurance in Cyberspace
  • Exercises
5

Secure Information Systems

  • Introduction
  • Assets Identification
  • Assets Communication
  • Assets Storage
  • Resource Access Control Facility
  • Securing the Email Communications
  • Information Security Management
  • Encryption Options in Emails
  • Steganography
  • Exercises
6

Cybersecurity and the CIO

  • Introduction
  • CIO: Personality
  • CIO: Education
  • Continuing Education and Skills Acquisition
  • CIO: Experience
  • CIO: Responsibilities
  • CIO: Information Security
  • CIO: The Changing Role
  • Adding Business Value through Cybersecurity
  • Exercises
7

Building a Secure Organization

  • Introduction
  • Business Continuity Planning
  • System Access Control
  • System Development and Maintenance
  • Physical and Environmental Security
  • Compliance
  • Personnel Security
  • Security Organization
  • Computer and Network Management
  • Asset Classification and Control
  • Security Policy
  • Encryption Key Management
  • EKM Features
  • Key Selection
  • Algorithms
  • Exercises
8

Cyberspace Intrusions

  • Introduction
  • IDPS Configuration
  • IDPS Capabilities
  • IDPS Management
  • IDPS Classification
  • IDPS Comparison
  • Predicting Cybersecurity Attacks
  • Cybersecurity Trends
  • Ransomware
  • Exercises
9

Cyberspace Defense

  • Introduction
  • File Protection Applications
  • PC Performance Applications
  • Protection Tools
  • Exercises
10

Cyberspace and the Law

  • Introduction
  • International Laws
  • Cyber-Related Laws in the United States
  • Cybercrime
  • Cybercrime in Banking
  • Cybercrime in e-Commerce
  • Cybersecurity in Maritime
  • Exercises
11

Cyber Warfare and Homeland Security

  • Introduction
  • Cyber Warfare
  • Homeland Security
  • Cybersecurity Preparedness
  • Distributed Defense
  • Warfare Information in an Information Warfare Terrain
  • Developing a National Strategy for Cybersecurity
  • Exercises
12

Digital Currencies

  • Introduction
  • The Blockchain Concept
  • Cryptocurrencies
  • Bitcoin
  • Cryptocurrency Wallet
  • Cybercrime in the Cryptocurrencies Domain
  • Purchasing Cryptocurrencies
  • Exercises
13

Transformation of Traditional Crime into Cybercrime

  • Introduction
  • Electronic Crime
  • Forms of Cybercrime
  • Investigating Electronic Crimes
  • Hackers and Crackers
  • Investigating Cybercrimes
  • Financial Cyber Scams
  • Chat Rooms
  • Trends in Cybercrime
  • Conclusion
  • Exercises

1

Vulnerabilities in Information Systems

  • Create a file backup
  • Displaying Network Information
2

Vulnerabilities in the Organization

  • Connecting an iPhone to a Laptop via Bluetooth
  • Configuring a VPN
3

Secure Information Systems

  • Encrypting Folder and Sub Folder
  • Implementing Symmetric Encryption
  • Adding a Digital Certificate
  • Configuring Network Firewall
4

Building a Secure Organization

5

Cyberspace Intrusions

  • Simulating a DoS Attack
  • Implementing Intrusion Detection System
6

Cyberspace Defense

  • Create a File Backup
  • Scanning the Computer Using MBSA Tool
  • Cracking Passwords Using Cain and Abel

Cyberspace and Cybersecurity

R 5,253.06

Buy Now

Related Courses

All Course
scroll to top